Sciweavers

2503 search results - page 413 / 501
» Building Computer Network Attacks
Sort
View
DEXAW
2000
IEEE
137views Database» more  DEXAW 2000»
15 years 5 months ago
A Holonic Component-Based Approach to Reconfigurable Manufacturing Control Architecture
Holonic Manufacturing Systems have emerged over the last seven years as strategy for manufacturing control system design. A new approach called Holonic ComponentBased Architecture...
Jin-Lung Chirn, Duncan C. McFarlane
ICC
2000
IEEE
113views Communications» more  ICC 2000»
15 years 5 months ago
LSMAC and LSNAT: Two Approaches for Cluster-Based Scalable Web Servers
— Server responsiveness and scalability are more important than ever in today’s client/server dominated network environments. Recently, researchers have begun to consider clust...
Xuehong Gan, Trevor Schroeder, Steve Goddard, Byra...
ICMCS
1999
IEEE
130views Multimedia» more  ICMCS 1999»
15 years 5 months ago
A Combinatorial Approach to Content-Based Music Selection
Advances in networking and transmission of digital multimedia data will bring soon huge catalogues of music to users. Accessing these catalogues raises a problem for users and con...
François Pachet, Pierre Roy, Daniel Cazaly
ICONIP
2004
15 years 2 months ago
Hybrid Feature Selection for Modeling Intrusion Detection Systems
Most of the current Intrusion Detection Systems (IDS) examine all data features to detect intrusion or misuse patterns. Some of the features may be redundant or contribute little (...
Srilatha Chebrolu, Ajith Abraham, Johnson P. Thoma...
CRIWG
2003
15 years 2 months ago
An Agent Framework to Support Opportunistic Collaboration
In increasingly networked times, CSCW systems have become more common. In most of these, individuals work collaboratively from their personal computer terminals, unaware of their p...
Melfry Moreno, Adriana Santarosa Vivacqua, Jano Mo...